Sciweavers

2061 search results - page 84 / 413
» Authorization for Metacomputing Applications
Sort
View
124
Voted
TNN
2010
147views Management» more  TNN 2010»
14 years 7 months ago
State-space analysis of Boolean networks
This paper provides a comprehensive framework for the state space approach to Boolean networks. First, it surveys the authors' recent work on the topic: Using semitensor produ...
Daizhan Cheng, Hongsheng Qi
TSP
2010
14 years 7 months ago
Greedy gossip with eavesdropping
Abstract-- This paper presents greedy gossip with eavesdropping (GGE), a new average consensus algorithm for wireless sensor network applications. Consensus algorithms have recentl...
Deniz Üstebay, Boris N. Oreshkin, Mark Coates...
ISMAR
2007
IEEE
15 years 6 months ago
Semi-automatic Annotations in Unknown Environments
Unknown environments pose a particular challenge for augmented reality applications because the 3D models required for tracking, rendering and interaction are not available ahead ...
Gerhard Reitmayr, Ethan Eade, Tom Drummond
ICALT
2006
IEEE
15 years 6 months ago
AWELS: Adaptive Web-Based Education and Learning Styles
Can learning styles (LS) be applied in current webbased systems? What are the main issues when applying LS in web-based systems? Can LS be authored in current web-based systems? W...
Alexandra I. Cristea, Natalia Stash
170
Voted
CBSE
2011
Springer
14 years 17 days ago
Rectifying orphan components using group-failover in distributed real-time and embedded systems
Orphan requests are a significant problem for multi-tier distributed systems since they adversely impact system correctness by violating the exactly-once semantics of application...
Sumant Tambe, Aniruddha S. Gokhale